Design a site like this with WordPress.com
Get started

TP-Link (BUFFER OVERFLOW VIA A LONG AUTHORIZATION HTTP HEADER) CVE-2018-15172

First, connect to this network:

 

 

new

 

 

Open BurpSuite and then start the intercept, making the necessary proxy changes to the internet browser.

connected admin-min

 

Goto Quick setup >

cookie-min

Now as the Burp is intercept is on, you will find an Authorization: Basic followed by a string. Now we paste a string consisting of 2000 zeros.

2000 zero-min

Then forward the connection>>>>>>>

Then your router automatically log out and the net connection will be gone.

netcut-min

 

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

Create a website or blog at WordPress.com

Up ↑

%d bloggers like this: